The State of Play of FirstNet

What's the status of FirstNet's state opt-in benefits and how does the network help support public safety? Also, what are the benefits of connecting first responders to IoT and Smart Cities? These are the question that Bill Schrier will answer on this LIVE PODCAST by NMG Media.

Scott Moore will take a dive into performance testing Internet of Things (IoT) applications and platforms. It includes a deeper look into two of the most popular protocols being used today: MQTT and CoAP. Learn how you can ensure your IoT platform and applications scale and reduce the risk of failure under load in highly constrained environments.

What will be covered:

• An overview of IoT architecture and protocols
• A deeper look into the MQTT and CoAP protocols specifically
• A demonstration ofhow to test the performance of IoT applications using LoadRunner 12.55

Join us for the next upcoming SIG Talk on Tuesday, March 13, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1073255&group=.

What's the status of FirstNet's state opt-in benefits and how does the network help support public safety? Also, what are the benefits of connecting first responders to IoT and Smart Cities? These are the question that Bill Schrier will answer on this LIVE PODCAST by NMG Media.

Today, businesses struggle to realize the full promise offered by the emergence of connected devices and the Internet of Things (IoT). To achieve this goal, companies must master the Digital Thread—the flow of data fueling the digital insights behind customer-centric experiences—in their efforts to develop new products and services.

The high-tech and aerospace industries are leading the way in this realm, as they reinvent how to deal with the deluge of data that flows from the proliferation of connected sensors, devices and components—a massive and pervasive challenge. Please join Accenture’s webcast to understand what this shifting paradigm means for your industry, and how you can effectively leverage data throughout the product lifecycle to drive new sources of revenue, gain competitive advantage, and deliver new digital services and experiences.

In this webinar you’ll:

Set yourself up for success by learning how to capture the lion share of value generated by a successfully woven Digital Thread;
Discover the most effective data ownership models across a supply chain;
Learn about real examples of how leading companies are introducing new business models, adapting to evolving workforces, and launching new products and services that leverage the power of the IoT.

Be the first to understand the implications of this shift, and share your opinions/questions with the top thought leaders attending this webcast.

Listen to GlobalData's Peter Jarich – VP, Consumer Services and Service Provider Infrastructure talk about who is in the lead for 5G test trials and deployments and what regions of the world we can expect the next generation of network communications?

How to Win in the New Era of Connected Car, Where Terabytes-Per-Day Matter More Than Miles-Per-Gallon

Individuals expect their connected car and automated vehicle experiences to be akin to being in their homes or offices. Being a leader in this new ecosystem means tackling — and delivering value from — upwards of 1.5TB of data per day, per vehicle. The opportunity is enormous, but how do we get there? And what will the ride be like?

Join Elliot Katz, Partner and Chair of the Connected and Automated Vehicle Practice at McGuireWoods, and James Dawson, Global Head of Connected Car at Cisco Jasper, as they reveal:

· Who the dominant players are in the new connected car & automated vehicle ecosystem, and how it will evolve from here
· The biggest and fastest-growing opportunities in the ecosystem today
· How rules and regulations need to change to enable this growth
· What enterprises and OEMs need to know now to stay ahead and capitalize on the opportunity

Our current security architecture is broken. We need a new approach to address the evolving IoT endpoint. Join Armis CTO Nadir Izrael as he discusses:

-Where current architecture is falling short
-What next-generation architecture should look like
-How to address vulnerabilities found in IoT devices/the unmanaged endpoint.

About Armis:

Armis eliminates the IoT security blind spot, protecting enterprises from the threat of unmanaged or rogue devices and networks. Customers including Samsung Research America and IDT Corporation trust Armis’ agentless IoT security platform to see and control any device or network. Armis is a privately held company and headquartered in Palo Alto, California.

There is a need to protect ALL Internet of Things (IoT) devices from unknown vulnerabilities. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, virtual power plants, smart homes, intelligent transportation and smart cities. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of about 30 billion objects by 2020. This session will discuss the key findings.
Viewers will learn:
• Current trends in Cyber attacks for IoT
• Security Metrics for IoT
• Oversight of third parties in IoT
• How to measure cybersecurity preparedness for IoT
• Automated approaches to integrate Security into IoT

From automated vehicles to ride hailing apps, transportation as we know it is changing - and fast. But new technologies alone won't help communities build the efficient, equitable, and sustainable transportation networks communities want. In fact, these innovative technologies could do just the opposite, especially if they are not deployed wisely. Cities must collect the right data and enact the right policies to ensure they do not exacerbate problems like inequity and traffic, and to hold themselves accountable to the promise of new mobility technologies.

In this webinar, you will find out why - and how - the smartest cities of tomorrow will be those that adopt data-driven transportation strategies today. Join for Laura Schewel's presentation to gain insights into:

• Why the status quo for transportation data collection is no longer good enough
• The types of Massive Mobile Data that are useful for transportation and urban planning
• Algorithmic processing techniques that are critical for making this data useful
• Case studies from California and Virginia that demonstrate why Massive Mobile Data drives more effective transportation planning
• A forward-looking blueprint for using Massive Mobile Data to maximize the potential benefits of new transportation technologies - and minimize negative impacts

Laura Schewel founded StreetLight Data, a mobility analytics provider, after spending more than a decade as an advanced transportation researcher and statistician at the Rocky Mountain Institute and FERC. She has particular expertise in transportation systems, sustainability and safety, and vehicle/system modeling and analysis.

IoT is a technology that has the potential to make us healthy, wealthy, and wise especially in healthcare. Healthcare is just now adopting IoT to improve patient outcomes and decrease the cost of care.

In this webinar, you’ll learn:

- How to identify if an IoT solution will work for your use case.
- What others in healthcare are using IoT for.
- The challenges of IoT in healthcare

Modern vehicles are, as Bruce Schneier recently put it, actually computers with wheels rather than cars with a computer added on. Every part of the vehicle's operation is supervised, logged, and managed by digital signals on a complex vehicle network. If you have a crash, your car will tell investigators if you were speeding or swerved to avoid the impact. If you spend too long dawdling at the convenience store instead of visiting your customers, your employer will know about it. If you waste fuel, drive dangerously, or don't turn your lights on when you should, it'll be recorded.

This introduces a lot of familiar debates in security circles. Who owns the data? What counts as personally identifiable? What are acceptable standards for logging, retention, and disclosure? What happens if we get it wrong?

The bad news is the vehicle landscape, like enterprise security, is badly fragmented. The good news is we've learned a lot of useful lessons over the past 20 years which can be brought to bear on the problem, so solving it shouldn't take another 20.

In this presentation we'll review some of the mechanics of how vehicle data is generated, who can see it, and how it can be used and abused. We'll then talk about points of leverage for the industry, the manufacturers, the owners, and law enforcement, and see what common ground exists. Finally, we'll lay out some basic ideas any fleet operator or concerned individual can use to make decisions about what vehicles to use and how to manage the data footprints they generate.

Software plays an expanding and critical role in the success of future vehicles such as automobiles and trucks. Novel technologies that depend on the flexibility of software create new vulnerabilities and new ways to attack systems. This talk explores the expanding landscape of vulnerabilities that accompany the increasing reliance on software and then examines some key steps to help mitigate the increased risk: development of appropriate requirements from an analysis of risks, techniques that can be applied during development, and evaluation approaches for existing systems. The talk will conclude with a view of emerging approaches to further improve the delivery and sustainment of such critical software.

About the Presenter:
Dr. Mark Sherman is the Director of the Cyber Security Foundations group at CERT within CMU’s Software Engineering Institute. His team focuses on foundational research on the life cycle for building secure software and on data-driven analysis of cyber security. Before coming to CERT, Dr. Sherman was at IBM and various startups, working on mobile systems, integrated hardware-software appliances, transaction processing, languages and compilers, virtualization, network protocols and databases. He has published over 50 papers on various topics in computer science.

Fog computing represents a tectonic shift for the future of transaction management, distributed supply chain and overall experience. It blurs the lines between the edge and the cloud and puts the focus on the systems which manage and balance the delivery of coherent, end-to-end sessions and associated transaction level agreements. As a result, this new technology is pervasive in several industries.

Join this panel of experts as they discuss solutions with specific industry use cases from smart fog for Cities, Buildings, Ports, and Maritime.

In this webinar, Jason Stamper, analyst for Data Platforms and Analytics at 451 Research, will look at some of the latest trends that are being seen in IoT and specifically analytics at the edge of the network — in other words close to where the data is generated.

He will also identify a number of data platform and analytics themes that are becoming more critical in the IoT era: security and data governance; infrastructure including edge analytics and server less computing; data processing; data integration and messaging.

Ram D. Sriram, Chief of the Software and Systems Division, IT Lab at National Institute of Standards and Technology

In this talk, Ram will provide a unified framework for Internet of Things, Cyber-Physical Systems, and Smart Networked Systems and Societies, and then discuss the role of ontologies for interoperability.

The Internet, which has spanned several networks in a wide variety of domains, is having a significant impact on every aspect of our lives. These networks are currently being extended to have significant sensing capabilities, with the evolution of the Internet of Things (IoT). With additional control, we are entering the era of Cyber-physical Systems (CPS). In the near future, the networks will go beyond physically linked computers to include multimodal-information from biological, cognitive, semantic, and social networks.

This paradigm shift will involve symbiotic networks of people (social networks), smart devices, and smartphones or mobile personal computing and communication devices that will form smart net-centric systems and societies (SNSS) or Internet of Everything. These devices – and the network -- will be constantly sensing, monitoring, interpreting, and controlling the environment.

A key technical challenge for realizing SNSS/IoE is that the network consists of things (both devices & humans) which are heterogeneous, yet need to be interoperable. In other words, devices and people need to interoperate in a seamless manner. This requires the development of standard terminologies (or ontologies) which capture the meaning and relations of objects and events. Creating and testing such terminologies will aid in effective recognition and reaction in a network-centric situation awareness environment.

Before joining the Software and Systems Division (his current position), Ram was the leader of the Design and Process group in the Manufacturing Systems Integration Division, Manufacturing Engineering Lab, where he conducted research on standards for interoperability of computer-aided design systems.

We live in an IoT world. Connected devices now include TVs, refrigerators, security systems, phones, music players, smart assistants, DSL modems, cars, and even toothbrushes. Besides privacy and personal security concerns, these devices pose significant risk of cyber attacks. IoT devices have been used in devastating DDoS attacks that have paralyzed key Internet services, emergency services, and heating systems. In addition to run-of-the-mill hackers and hacktivists, they are the first line of attack in any low-to-medium scale cyber conflict between nation states.

Vulnerable IoT devices represent a direct threat to safety, life, property, business continuity, and general stability of the society.

This talk will discuss the security challenges surrounding IoT devices, and what is needed for a balanced framework that forces vendors to implement a reasonable level of best practice without causing them undue burden and risk.

About the Presenter:
Tatu Ylonen is a cybersecurity pioneer with over 20 years of experience from the field. He invented SSH (Secure Shell), which is the plumbing used to manage most networks, servers, and data centers and implement automation for cost-effective systems management and file transfers. He is has also written several IETF standards, was the principal author of NIST IR 7966, and holds over 30 US patents - including some on the most widely used technologies in reliable telecommunications networks.

Smart Cities is one of the essential endeavours right now. Smart Cities use many existing and emerging information technologies, Smart Cities must change lives of many people and each Smart Cities programme and project is a daunting task. Therefore Smart Cities must be considered as a system which perfectly delivers its desired capabilities.

This presentation will discuss how several modern techniques, such as systems approach, standardisation, reference architecture, patterns, explicit security, can be combined to enable world-wide cooperation and coordination in delivery of various Smart Cities.

Speaker's bio:

Alexander Samarin wrote his first software program in the year 1973. He obtained a PhD (in computer graphics) in the year 1986. He has worked for a variety of international clients in Switzerland, UK, France, Australia and Africa. He specialises in architecture, implementation and evolution of enterprise-wide solutions with the holistic use of enterprise architecture, business architecture, BPM, SOA, ECM, IT governance and IT strategy. In October 2009 he published a book “Improving enterprise business process management systems”. Since August 2013 he works as an architect for achieving the synergy between strategy, good business practices and disruptive digital technologies for digital systems.

Networks are changing. With the vast expansion of IoT, we're experiencing the transition of enterprise and operator infrastructure from networks of people to networks of people, places and things.

Join Christian Renaud, Research Director, IoT at 451 Research, as he looks at the impacts of the growing number of instrumented environments and objects on enterprise and carrier networks, capacities, signaling protocols, and emerging opportunities for value creation beyond simple connectivity.

This webinar will cover:
- Possible bottlenecks and roadblocks on the path to the Internet of Things
- What leading organizations are doing today to prepare for the coming influx of new types of devices

The Internet of Things (IoT) is one of the most exciting and dynamic areas of IT at the present time. IoT involves the linking of physical entities (“things”) with IT systems that derive information about or from those things which can be used to drive a wide variety of applications and services. IoT covers a very wide spectrum of applications, spanning enterprises, governments and consumers and represents the integration of systems from traditionally different communities: Information Technology and Operational Technology. As a result, it is important for IoT systems to have architectures, systems principles, and operations that can accommodate the interesting scale, safety, reliability, and privacy requirements. Attend this webinar to hear best practices for supporting the Internet of Things (IoT) using cloud computing.

The Internet of Things is upon us. Vast amounts of big data are quickly approaching and network traffic, latency and bandwidth are at higher demands than ever. Storing, transmitting, and analyzing this data from IoT devices will require a secure and agile network architecture. Network failover and network security will be of the utmost importance.

How will these changes in demand and technologies have an impact on new standards and protocols? Will network communications between devices and the cloud be safe? Tune into this dynamic panel discussion with leading IoT and network experts for the state of IoT networks.

The IoT represents a significant challenge for companies new to supplying connected products and in particular the associated security implications. Traditionally security was often seen as something that was firmly in the domain of the IT or related department. However, with IoT systems being dependant upon a variety of sensors and embedded devices, the impact of supplying secure IoT products spans the whole of the company business; from the supply chain to how an organisation handles vulnerability disclosure. This session will go through some of the challenges that face businesses delivering secure IoT products and the guidance available to help companies take secure IoT products to market and having launched them, ensuring that they are able to support them from a security perspective.